software

Results 326 - 350 of 5432Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee
Published By: Cisco     Published Date: Dec 21, 2016
Technology’s role in business and society has shifted away from largely driving efficiencies to innovating and creating engaging experiences that attract and retain customers. Innovations and business outcomes are fueled by a perfect storm of technology trends in cloud, analytics, machine learning, IoT and the emerging API Economy. The convergence of these technologies has created new opportunities for enterprises to improve business performance by acquiring customers faster while creating brand loyalty. The role of technology expands the interaction with customers beyond the core of the enterprise – away from 100% dependencies on systems of records – and towards real-time, contextual interactions. Businesses are a digital business or they are evolving to become one. This requires enterprises to re-think how they build software architectures.
Tags : 
    
Cisco
Published By: PDF Tools     Published Date: Aug 21, 2009
PDF files are prevalent in virtually all market segments worldwide. Most people know and use the term "PDF" but have misconceptions what it can and can't do. The purpose of this White Paper is to explain what PDF actually is and what it's strengths and limitations are.
Tags : 
content delivery, document management, information management, ebusiness, enterprise software, pdf, portable document format, adobe
    
PDF Tools
Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure
    
Entrust Datacard
Published By: Systinet     Published Date: Aug 21, 2009
As a strategy for creating a flexible and agile IT, service-oriented architecture (SOA) has gained considerable momentum in recent years, largely due to the advent of standards-based Web services.
Tags : 
web services security, web services, web service security, information management, business analytics, business metrics, system management software, programming application
    
Systinet
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: Aug 18, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations.
Tags : 
consumerization, enterprise, it service, best practices
    
BMC Software
Published By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : 
rackspace, cloud, application, software development
    
Rackspace
Published By: Centric Software     Published Date: Dec 20, 2010
Customers should see meaningful returns on PLM investments within one product cycle, or 4 to 6 months.
Tags : 
product lifecycle management, plm, plm software, manufacturing best practices
    
Centric Software
Published By: IBM     Published Date: Oct 22, 2013
Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change.
Tags : 
ibm, integration testing, optimize test efficiency, incremental integration, employ test virtualization, system-level testing, asset sharing, effective data management
    
IBM
Published By: IBM     Published Date: Jan 10, 2014
Applications are evolving at an ever-faster pace. These applications are not discrete islands; they build on a complex, interconnected set of components that includes disparate technologies, developers, deployment topologies and organizations. Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change. This whitepaper helps address these needs by describing the benefits that can be gained through a proactive and continuous approach to integration testing with IBM® Rational® test automation solutions.
Tags : 
ibm, rational, integration, integration testing, incremental integration, testing, virtulization, data management
    
IBM
Published By: IBM     Published Date: Feb 18, 2015
In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change. This white paper helps address these needs by describing the benefits that can be gained through a proactive and continuous approach to integration testing with IBM® Rational® test automation solutions.
Tags : 
integration testing, test virtualization, ibm, test automation solutions
    
IBM
Published By: SAP     Published Date: Feb 21, 2008
Many significant business initiatives and large IT projects depend upon a successful data migration. Your goal is to minimize as much risk as possible through effective planning and scoping. This paper will provide insight into what issues are unique to data migration projects and offer advice on how to best approach them.
Tags : 
sap, data architect, data migration, business objects, information management software, bloor, sap r/3, application
    
SAP
Published By: Electric Cloud     Published Date: Nov 04, 2009
ElectricAccelerator improves the software development process by reducing build times, so development teams can reduce costs, shorten time-to-market, and improve quality and customer satisfaction.
Tags : 
electric cloud, electricaccelerator, software development, dependency management, software build accelerator, visualization, cluster manager, open source
    
Electric Cloud
Published By: Oracle     Published Date: Aug 18, 2016
This infographic shows how to deliver secure cloud computing with Oracle Solaris and SPARC M7 software in Silicon technology.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems.
Tags : 
    
Oracle
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Since a decade the market has seen an outburst of data. With Managing and Securing Data is Crucial. With 3.8 Billion mobile users and 24 Zetta bytes of data created, and 100% attacks that target username and password credentials, managing and securing data has become a crucial and the most critical aspect for almost every Business. Oracle’s SPARC M7 processor, with Oracle’s Software in Silicon technology, is the industry’s most advanced multi thread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud based server infrastructure with unprecedented levels of security, efficiency, and performance.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle CX     Published Date: Oct 19, 2017
Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems.
Tags : 
    
Oracle CX
Published By: Citrix     Published Date: Apr 10, 2017
Unauthorised employee use of personal file sharing services such as Dropbox and Box represents security risks to businesses.
Tags : 
enterprise software, file sharing, enterprise solutions
    
Citrix
Published By: ProjectLocker     Published Date: Aug 21, 2009
This paper provides a brief overview of Wiki and its emerging importance in the business marketplace. It describes ways in which many major corporations are taking advantage of this new social software to transform their business practices, and lays out a short set of guidelines to consider before implementing your own Wiki solution.
Tags : 
collaboration, corporate portals, information management, intranets, messaging, wiki, wikipedia, social marketing
    
ProjectLocker
Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
Published By: Central Desktop     Published Date: Aug 05, 2011
Central Desktop is the ideal collaboration software for technology companies looking for a secure, powerful solution that will reduce costs, enhance team collaboration and improve project management. It helps IT directors and teams keep documentation up-to-date, share files, manage versions, and keep internal business units from using unapproved, non secure services for sharing documents online and internally. >>>Register to learn more
Tags : 
social collaboration, online collaboration, collaboration software, team collaboration, sharepoint alternative, project collaboration, online team collaboration, online project management
    
Central Desktop
Published By: Skillsoft     Published Date: Mar 05, 2014
Research providing an insight into how Skillsoft provides a solid answer to the global talent imperative
Tags : 
global talent, development, elearning software, training
    
Skillsoft
Published By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : 
microsoft sharepoint, data integration, security, sharepoint solutions
    
K2
Published By: Cisco     Published Date: Sep 27, 2019
Check out this infographic that illustrates how Cisco’s subscription-based software is designed to make networking simple.
Tags : 
    
Cisco
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library